问题:单选题You would like to configure a fractional T1 interface on a channelized T3 controller with the following properties: Which set of configuration commands accomplishes this goal?()A AB BC CD D...
查看答案
问题:单选题In a Bridged 1483 network, which set of commands is used to configure an ATM sub-interface?()A interface atm 6/0.33 atm pvc 33 0 33 aal5snap ip description Company-XYZ encapsulation bridge1483 ip address unnumbered loopback0B interface atm 6/0.33 atm p...
问题:多选题Content filtering enables traffic to be permitted or blocked based on inspection of which three types of content?()(Choose three.)AMIME patternBfile extensionCIP spoofingDPOP3Eprotocol command...
问题:单选题Two Level 1 routers are exchanging Hello packets with different Area IDs.What occurs between these routers?()A An Adjacency is formed.B No IS-IS PDUs are sentC An Adjacency does not form.D An Adjacency forms but traffic is not forwarded....
问题:Which configuration command is used to make the ERX Edge Rou...
问题:单选题Two Level 2 routers are exchanging Hello packets with different Area IDs.What occurs between these routers?()A An Adjacency is formed.B No IS-IS PDUs are sent.C An Adjacency does not form.D An Adjacency forms but traffic is not forwarded....
问题:多选题What are three components of the NET address? ()(Choose three.)AArea IDBN-selectorCSystem IDDISO numberEMAC address...
问题:You would like to operate IS-IS on interface atm 6/0.33 with...
问题:单选题Which configuration shows the correct application of a security policy scheduler?()A [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; ...
问题:多选题The Origin attribute describes the source of the BGP prefix. Which three are valid Origin codes?() (Choose three.)AIGPBBGPCEGPDIncompleteEAnonymous...
问题:单选题End users are failing to log in to the network. Which command is used on the ERX Edge Router to validate communications with the RADIUS server?()A test ppp aaaB test aaa pppC test radius userD test user radius...
问题:Which two statements are true regarding the system-default s...
问题:多选题Which three functions are provided by the Junos OS for security platforms?()(Choose three.)AVPN establishmentBstateful ARP lookupsCDynamic ARP inspectionDNetwork Address TranslationEinspection of packets at higher levels (Layer 4 and above)...
问题:多选题Which three statements are correct regarding the CLI command, 12tp destination profile to-NewYork virtual-router vr1 ip address 1.1.1.1 ? ()(Choose three.)ALNS IP address is defined.BLAC IP address is defined.CVirtual-router vr1 sends and receives L2TP...
问题:单选题Which CLI command displays statistical information about a policy called goldservice ?()A show ip interface atm 5/1.1B show policy-list goldserviceC show profile name goldserviceD show rate-limit-profile goldservice...
问题:Which IS-IS authentication method is supported on the ERX Ed...
问题:单选题Which command is used to display a address pool for a DHCP Local Server?()A show ip local poolB show ip dhcp local poolC show ip dhcp-local poolD show ip pool...
问题:The same Web site is visited for the second time using a bra...
问题:单选题Which configuration command causes a PPPoE subscriber to be connected to a captive portal?()A urlB motmC acNameD sessions...
问题:多选题Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)ATraffic is permitted from the trust zone to the untrust zone.BIntrazone traffic in the trust zone is permitted.CAll traff...